facebook

youtube

facebook

youtube

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

Please be informed that the following email is a spam. Please ignore and do not open the attachment. 

spamvc

For any inquiries, please contact UUMIT at 04-9286666 or email to This email address is being protected from spambots. You need JavaScript enabled to view it..

Thank you 

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

Please be informed that the following email is a spam. Please ignore and do not open the attachment.  

Mail 31okt2019
For any inquiries, please contact UUMIT at 04-9286666 or email to This email address is being protected from spambots. You need JavaScript enabled to view it.. Thank you

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

Please be informed that the following email is a spam. Please ignore and do not open the attachment.  

itservices spam
For any inquiries, please contact UUMIT at 04-9286666 or email to This email address is being protected from spambots. You need JavaScript enabled to view it.. Thank you

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

Please be informed that the following email is a spam. Please ignore and do not open the attachment.  

To: xxxxxxxx <This email address is being protected from spambots. You need JavaScript enabled to view it.>
Subject: Attention! read this email

spamtday

For any inquiries, please contact UUMIT at 04-9286666 or email to This email address is being protected from spambots. You need JavaScript enabled to view it..

Thank you

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

Please be informed that the following email is a spam. Please ignore and do not open the attachment.  

  From: This email address is being protected from spambots. You need JavaScript enabled to view it.
  To: This email address is being protected from spambots. You need JavaScript enabled to view it.
  Subject: Terms of use Privacy

  Dear xxxxx,

  For added security, we need to further verify your account This email address is being protected from spambots. You need JavaScript enabled to view it. because is on uum.edu.my old server since
  on the Monday, May 06,  2019

  Admin required that you set up this account on new server for additional security
  uum.edu.my

  Enter New uum.edu.my Server

  uum.edu.my Terms of use Privacy & cookies

For any inquiries, please contact UUMIT at 04-9286666 or email to This email address is being protected from spambots. You need JavaScript enabled to view it..

Thank you

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

Social networking sites (such as Facebook and Twitter), personal web pages, and blogs are notorious as public sources of personal information and uncensored opinions.

  • Do not reveal personal details or confidential info online. Assume that anything you post to these websites is public and could potentially be used against you.
    •  A good rule of thumb is to only post information you would be willing to put on a banner displayed in a public place. 
    • Seemingly innocent information about your interests, family, or history could be used by hackers for identity theft, or by stalkers or social engineers.
  • Also keep in mind that once you post something online, it can be very difficult to “take it back.” Even if you delete the information, copies can still exist on other computers, web sites, or in search engines.

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

Several proactive steps you can take to help maximize security and privacy when using Google are:

  • Enable two-step verification
  • Protect your CruzID Blue password 
    • Don’t reveal it to anyone 
    • Don’t re-use it for other accounts
  • Keep restricted data out of Google, or encrypt it first 
  • Limit sharing of Google Docs to only those who need access, including who can edit vs. view docs
  • Review your sharing settings in Google calendar 
  • Report spam and phishing to Google 
  • Use Google’s “Account Activity” features to help make sure no one else is using your account 
  • Sign out of your Google account when you are not using it

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

1. You Are A Target.

Realize that you are an attractive target to hackers. Don’t ever say “It won’t happen to me.

2. Eight Characters Is Not Enough.

Practice good password management. Use a strong mix of characters, and don’t use the same password for multiple sites. Don’t share your password with others, don’t write it down, and definitely don’t write it on a post-it note attached to your monitor.

3. Lock It Up.

Never leave your devices unattended. If you need to leave your computer, phone, or tablet for any length of time—no matter how short—lock it up so no one can use it while you’re gone. If you keep sensitive information on a flash drive or external hard drive, make sure to lock it up as well.

4. Practice Safe Clicking.

Always be careful when clicking on attachments or links in email. If it’s unexpected or suspicious for any reason, don’t click on it. Double check the URL of the website the link takes you to: bad actors will often take advantage of spelling mistakes to direct you to a harmful domain. 

5. Beware Of Browsing.

Sensitive browsing, such as banking or shopping, should only be done on a device that belongs to you, on a network that you trust. Whether it’s a friend’s phone, a public computer, or a cafe’s free WiFi—your data could be copied or stolen.

6. Back It Up.

Back up your data regularly, and make sure your anti-virus software is always up to date.

7. Physical Cyber Safety.

Be conscientious of what you plug in to your computer. Malware can be spread through infected flash drives, external hard drives, and even smartphones.

8. Share Less Sensitive Information.

Watch what you’re sharing on social networks. Criminals can befriend you and easily gain access to a shocking amount of information—where you go to school, where you work, when you’re on vacation—that could help them gain access to more valuable data.

9. Cut Out The “Middle Man”.

Offline, be wary of social engineering, where someone attempts to gain information from you through manipulation. If someone calls or emails you asking for sensitive information, it’s okay to say no. You can always call the company directly to verify credentials before giving out any information.

10. Stay On Top Of  Your Accounts.

Be sure to monitor your accounts for any suspicious activity. If you see something unfamiliar, it could be a sign that you’ve been compromised.

 

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

Please be informed that the following email is a spam. Please ignore and do not open the attachment.  

telekom

For any inquiries, please contact UUMIT at 04-9286666 or email to This email address is being protected from spambots. You need JavaScript enabled to view it..

Thank you

Page 1 of 6

UUM Information Technology (UUMIT), Universiti Utara Malaysia, 06010 UUM Sintok, Kedah, Malaysia
Disclaimer | Privacy & Security Policy | Copyright | Sitemap | FAQs | ISO System

Search